Which can be done to secure the virtual terminal interfaces on a router?()A、Administratively shut down the interfaces.B、Physically secure the interfaces.C、Configure a virtual terminal password and login process.D、Enter an access list and apply it to the terminal interfaces using the access-class command.E、Create an access list and apply it to the terminal interfaces using the access-group command
Which can be done to secure the virtual terminal interfaces on a router?()
- A、Administratively shut down the interfaces.
- B、Physically secure the interfaces.
- C、Configure a virtual terminal password and login process.
- D、Enter an access list and apply it to the terminal interfaces using the access-class command.
- E、Create an access list and apply it to the terminal interfaces using the access-group command
相关考题:
These books, ________ at any bookshop, will give you all the information you need. (A) you can get(B) that you can get(C) what you can get(D) which you can get
Those books, () at any bookshop, will give you all information you need. A、you can getB、that you can getC、what you can getD、which you can get
It is a kind of online service system, on which you can publish and exchange information with others who also are the members of the system.On which you can paste your articles and answer the questions asked by the members of the system and you can also look for help here.It isA.BBSB.WWWC.E-mailD.TELNET
Which are the two options to which a menu can be assigned?() (Choose two.) A.menuB.functionsC.data groupD.responsibilityE.functional group
A system administrator detects thousands of open idle connections from the same source.Which problem can arise from this type of attack?() A. It enables an attacker to perform an IP sweep of devices.B. It enables a hacker to know which operating system the system is running.C. It can overflow the session table to its limit, which can result in rejection of legitimate traffic.D. It creates a ping of death and can cause the entire network to be infected with a virus.
Which of the following methods can move files in clear text and can be easily intercepted?() A.RSHB.SNMPC.FTPD.TELNET
The truth is that it is only by studying history( )we can learn what to expect in the future. A.which B.and then C.that D.by which
Such changes can alter the social structure,()people to move.A、which leadingB、leadsC、which ledD、leading
Which are the two options to which a menu can be assigned?() (Choose two.)A、menuB、functionsC、data groupD、responsibilityE、functional group
Several @functions can execute multiple statements. Which one of the following initializes a variable and can increment in during the operation?()A、 @do B、 @for C、 @while D、 @dowhile
Application Control Engine (ACE) can check the health of servers and server farms by configuring health probes (which are sometimes referred to as keepalives). A probe can be one of many types. Which are valid ACE probes? ()A、 HTTPB、 Java scriptingC、 TCL scriptingD、 RADIUSE、 TACACS
Which of the following methods can move files in clear text and can be easily intercepted?()A、RSHB、SNMPC、FTPD、TELNET
which one of the following accurately describes field names?()A、they must be unique in a database B、they can only be used once in a view C、they can only used once on each form D、they can be used mulriple times on a form
Which statements are true regarding a tablespace()A、It can span multiple databases.B、It can consist of multiple data files.C、It can contain blocks of different sizes.D、It can contain segments of different sizes.E、It can contain a part of a nonpartitioned segment
Which two statements are true regarding a tablespace()A、It can span multiple databases.B、It can consist of multiple data files.C、It can contain blocks of different sizes.D、It can contain segments of different sizes.E、It can contain a part of a nonpartitioned segment.
多选题Which are the two options to which a menu can be assigned?() (Choose two.)AmenuBfunctionsCdata groupDresponsibilityEfunctional group
单选题Which of the following is not the advantage of the Internet?Athe news can be made more democraticBthe public can turn to different sourcesCthe public can get a chance to ask questionsDanything can be posted on the Internet for others to see
多选题Application Control Engine (ACE) can check the health of servers and server farms by configuring health probes (which are sometimes referred to as keepalives). A probe can be one of many types. Which are valid ACE probes? ()AHTTPBJava scriptingCTCL scriptingDRADIUSETACACS
单选题The minimum range at which a target can be detected is basically determined by which of the following?().ApersistenceBpulse repetition rateCpulse lengthDrotation rate
单选题A system administrator detects thousands of open idle connections from the same source.Which problem can arise from this type of attack?()AIt enables an attacker to perform an IP sweep of devices.BIt enables a hacker to know which operating system the system is running.CIt can overflow the session table to its limit, which can result in rejection of legitimate traffic.DIt creates a ping of death and can cause the entire network to be infected with a virus.
单选题Where does the look-out man stand?().AIn positions in which the noises in the ship are least likely to interfere with the hearing of a fog signal and the man can see clearlyBIn positions in which the noises in the ship are much likely to interfere with the hearing of a fog signalCIn positions in which the hearing of a signal is reduced to a minimumDIn a position in which the man can see clearly
单选题The real poet is a master of words. He can _____ his meaning in words which sing like music, and which by their position and association can move men tears.AtransformBtransmitCmanifestDconvey